William Enck
North Carolina State University
H-index: 38
North America-United States
Top articles of William Enck
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit | arXiv preprint arXiv:2307.15642 | Mindy Tran Yasemin Acar Michel Cucker William Enck Alexandros Kapravelos | 2023/7/28 |
Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis | Trevor Dunlap Seaver Thorn William Enck Bradley Reaves | 2023/7/10 | |
VFCFinder: Seamlessly Pairing Security Advisories and Patches | arXiv preprint arXiv:2311.01532 | Trevor Dunlap Elizabeth Lin William Enck Bradley Reaves | 2023/11/2 |
MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy | Iffat Anjum Jessica Sokal Hafiza Ramzah Rehman Ben Weintraub Ethan Leba | 2023/5/24 | |
PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage | IEEE Transactions on Dependable and Secure Computing | Yu-Tsung Lee Haining Chen William Enck Hayawardh Vijayakumar Ninghui Li | 2023/8/30 |
S3C2 Summit 2023-06: Government Secure Supply Chain Summit | arXiv preprint arXiv:2308.06850 | William Enck Yasemin Acar Michel Cukier Alexandros Kapravelos Christian Kästner | 2023/8/13 |
It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security | Proceedings of the 44th IEEE Symposium on Security and Privacy (S&P 2023) | Marcel Fourné Dominik Wermke William Enck Sascha Fahl Yasemin Acar | 2023/5 |
Software Bills of Materials Are Required. Are We There Yet? | Nusrat Zahan Elizabeth Lin Mahzabin Tamanna William Enck Laurie Williams | 2023/4/14 | |
S3C2 Summit 2023-02: Industry Secure Supply Chain Summit | arXiv preprint arXiv:2307.16557 | Trevor Dunlap Yasemin Acar Michel Cucker William Enck Alexandros Kapravelos | 2023/7/31 |
{ALASTOR}: Reconstructing the Provenance of Serverless Intrusions | Pubali Datta Isaac Polinsky Muhammad Adil Inam Adam Bates William Enck | 2022 | |
Optimizing Honey Traffic Using Game Theory and Adversarial Learning | Mohammad Sujan Miah Mu Zhu Alonso Granados Nazia Sharmin Iffat Anjum | 2022/10/7 | |
{FReD}: Identifying File {Re-Delegation} in Android System Services | Sigmund Albert Gorski III Seaver Thorn William Enck Haining Chen | 2022 | |
Removing the Reliance on Perimeters for Security using Network Views | Iffat Anjum Daniel Kostecki Ethan Leba Jessica Sokal Rajit Bharambe | 2022/6/7 | |
A Study of Application Sandbox Policies in Linux | Trevor Dunlap William Enck Bradley Reaves | 2022/6/7 | |
Reflections on a Decade of Mobile Security Research | William Enck | 2022/5/16 | |
Top Five Challenges in Software Supply Chain Security: Observations From 30 Industry and Government Organizations | IEEE Security & Privacy | William Enck Laurie Williams | 2022/3/24 |
Analysis of Payment Service Provider SDKs in Android | Samin Yaseer Mahmud K. Virgil English Seaver Thorne William Enck Adam Oest | 2022 | |
SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing | Isaac Polinsky Pubali Datta Adam Bates William Enck | 2021/6/11 | |
Role-Based Deception in Enterprise Networks | Iffat Anjum Mu Zhu Isaac Polinsky William Enck Michael K Reiter | 2021/4/26 | |
Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem | Christopher Lentzsch Sheel Jayesh Shah Benjamin Andow Martin Degeling Anupam Das | 2021 |